

Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.

# Directory Service Contoh data menggunakan AWS CLI
<a name="cli_directory-service-data_code_examples"></a>

Contoh kode berikut menunjukkan cara melakukan tindakan dan mengimplementasikan skenario umum dengan menggunakan AWS Command Line Interface With Directory Service Data.

*Tindakan* merupakan kutipan kode dari program yang lebih besar dan harus dijalankan dalam konteks. Sementara tindakan menunjukkan cara memanggil fungsi layanan individual, Anda dapat melihat tindakan dalam konteks dalam skenario terkait.

Setiap contoh menyertakan tautan ke kode sumber lengkap, di mana Anda dapat menemukan instruksi tentang cara mengatur dan menjalankan kode dalam konteks.

**Topics**
+ [Tindakan](#actions)

## Tindakan
<a name="actions"></a>

### `add-group-member`
<a name="directory-service-data_AddGroupMember_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`add-group-member`.

**AWS CLI**  
**Untuk menambahkan anggota grup ke direktori**  
`add-group-member`Contoh berikut menambahkan pengguna yang ditentukan ke grup tertentu dalam direktori yang ditentukan.  

```
aws ds-data add-group-member \
    --directory-id d-1234567890 \
    --group-name 'sales' \
    --member-name 'john.doe'
```
Perintah ini tidak menghasilkan output.  
Untuk selengkapnya, lihat [Menambahkan atau menghapus anggota Microsoft AD AWS Terkelola ke grup dan grup ke grup](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_add_remove_user_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [AddGroupMember](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/add-group-member.html)di *Referensi AWS CLI Perintah*. 

### `create-group`
<a name="directory-service-data_CreateGroup_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`create-group`.

**AWS CLI**  
**Untuk daftar widget yang tersedia**  
`create-group`Contoh berikut membuat grup dalam direktori tertentu.  

```
aws ds-data create-group \
    --directory-id d-1234567890 \
    --sam-account-name "sales"
```
Output:  

```
{
    "DirectoryId": "d-1234567890",
    "SAMAccountName": "sales",
    "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
}
```
Untuk informasi selengkapnya, lihat [Membuat grup AD Microsoft AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_create_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [CreateGroup](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/create-group.html)di *Referensi AWS CLI Perintah*. 

### `create-user`
<a name="directory-service-data_CreateUser_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`create-user`.

**AWS CLI**  
**Untuk membuat pengguna**  
`create-user`Contoh berikut membuat pengguna dalam direktori yang ditentukan.  

```
aws ds-data create-user \
    --directory-id d-1234567890 \
    --sam-account-name 'john.doe'
```
Output:  

```
{
    "DirectoryId": "d-1234567890",
    "SAMAccountName": "john.doe",
    "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
}
```
Untuk informasi selengkapnya, lihat [Membuat pengguna Microsoft AD yang AWS Dikelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_create_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [CreateUser](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/create-user.html)di *Referensi AWS CLI Perintah*. 

### `delete-group`
<a name="directory-service-data_DeleteGroup_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`delete-group`.

**AWS CLI**  
**Untuk menghapus grup**  
`delete-group`Contoh berikut menghapus grup tertentu dari direktori yang ditentukan.  

```
aws ds-data delete-group \
    --directory-id d-1234567890 \
    --sam-account-name 'sales'
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Menghapus grup iklan Microsoft yang AWS Dikelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [DeleteGroup](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/delete-group.html)di *Referensi AWS CLI Perintah*. 

### `delete-user`
<a name="directory-service-data_DeleteUser_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`delete-user`.

**AWS CLI**  
**Untuk menghapus pengguna**  
`delete-user`Contoh berikut menghapus pengguna tertentu dari direktori yang ditentukan.  

```
aws ds-data delete-user \
    --directory-id d-1234567890 \
    --sam-account-name 'john.doe'
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Menghapus pengguna Microsoft AD yang AWS Dikelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [DeleteUser](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/delete-user.html)di *Referensi AWS CLI Perintah*. 

### `describe-group`
<a name="directory-service-data_DescribeGroup_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`describe-group`.

**AWS CLI**  
**Untuk membuat daftar detail grup**  
`describe-group`Contoh berikut mendapat informasi untuk grup tertentu dalam direktori yang ditentukan.  

```
aws ds-data describe-group \
    --directory-id d-1234567890 \
    --sam-account-name 'sales'
```
Output:  

```
{
    "DirectoryId": "d-1234567890",
    "DistinguishedName": "CN=sales,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
    "GroupScope": "Global",
    "GroupType": "Security",
    "Realm": "corp.example.com",
    "SAMAccountName": "sales",
    "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui detail grup Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [DescribeGroup](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/describe-group.html)di *Referensi AWS CLI Perintah*. 

### `describe-user`
<a name="directory-service-data_DescribeUser_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`describe-user`.

**AWS CLI**  
**Untuk mencantumkan informasi untuk pengguna**  
`describe-user`Contoh berikut mendapat informasi untuk pengguna tertentu dalam direktori tertentu.  

```
aws ds-data describe-user command-name \
    --directory-id d-1234567890 \
    --sam-account-name 'john.doe'
```
Output:  

```
{
    "DirectoryId": "d-1234567890",
    "DistinguishedName": "CN=john.doe,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
    "Enabled": false,
    "Realm": "corp.example.com",
    "SAMAccountName": "john.doe",
    "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567",
    "UserPrincipalName": "john.doe@CORP.EXAMPLE.COM"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui pengguna Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [DescribeUser](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/describe-user.html)di *Referensi AWS CLI Perintah*. 

### `disable-directory-data-access`
<a name="directory-service-data_DisableDirectoryDataAccess_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`disable-directory-data-access`.

**AWS CLI**  
**Untuk menonaktifkan API Data Directory Service untuk direktori**  
`disable-directory-data-access`Contoh berikut menonaktifkan API Directory Service Data untuk direktori yang ditentukan.  

```
aws ds disable-directory-data-access \
    --directory-id d-1234567890
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Mengaktifkan atau menonaktifkan manajemen pengguna dan grup atau AWS Directory Service Data](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html) dalam Panduan Administrasi *AWS Directory Service*.  
+  Untuk detail API, lihat [DisableDirectoryDataAccess](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/disable-directory-data-access.html)di *Referensi AWS CLI Perintah*. 

### `disable-user`
<a name="directory-service-data_DisableUser_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`disable-user`.

**AWS CLI**  
**Untuk menonaktifkan pengguna**  
`disable-user`Contoh berikut menonaktifkan pengguna yang ditentukan dalam direktori yang ditentukan.  

```
aws ds-data disable-user \
    --directory-id d-1234567890 \
    --sam-account-name 'john.doe'
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Menonaktifkan pengguna AWS Microsoft AD yang Dikelola di Panduan](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_disable_user.html) *Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [DisableUser](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/disable-user.html)di *Referensi AWS CLI Perintah*. 

### `enable-directory-data-access`
<a name="directory-service-data_EnableDirectoryDataAccess_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`enable-directory-data-access`.

**AWS CLI**  
**Untuk mengaktifkan API Data Directory Service untuk direktori**  
`enable-directory-data-access`Contoh berikut memungkinkan Directory Service Data API untuk direktori yang ditentukan.  

```
aws ds enable-directory-data-access \
    --directory-id d-1234567890
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Mengaktifkan atau menonaktifkan manajemen pengguna dan grup atau AWS Directory Service Data](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html) dalam Panduan Administrasi *AWS Directory Service*.  
+  Untuk detail API, lihat [EnableDirectoryDataAccess](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/enable-directory-data-access.html)di *Referensi AWS CLI Perintah*. 

### `list-group-members`
<a name="directory-service-data_ListGroupMembers_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`list-group-members`.

**AWS CLI**  
**Untuk mencantumkan anggota grup direktori**  
`list-group-members`Contoh berikut mencantumkan anggota grup untuk grup tertentu dalam direktori yang ditentukan.  

```
aws ds-data list-group-members \
    --directory-id d-1234567890 \
    --sam-account-name 'sales'
```
Output:  

```
{
    "Members": [
        {
            "MemberType": "USER",
            "SAMAccountName": "Jane Doe",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
        },
        {
            "MemberType": "USER",
            "SAMAccountName": "John Doe",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
        }
    ],
    "DirectoryId": "d-1234567890",
    "MemberRealm": "corp.example.com",
    "Realm": "corp.example.com"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui detail grup Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [ListGroupMembers](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/list-group-members.html)di *Referensi AWS CLI Perintah*. 

### `list-groups-for-member`
<a name="directory-service-data_ListGroupsForMember_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`list-groups-for-member`.

**AWS CLI**  
**Untuk mencantumkan keanggotaan grup direktori**  
`list-groups-for-member`Contoh berikut mencantumkan keanggotaan grup untuk pengguna tertentu dalam direktori yang ditentukan.  

```
aws ds-data list-groups-for-member \
    --directory-id d-1234567890 \
    --sam-account-name 'john.doe'
```
Output:  

```
{
    "Groups": [
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Domain Users",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
        }
    ],
    "DirectoryId": "d-1234567890",
    "MemberRealm": "corp.example.com",
    "Realm": "corp.example.com"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui pengguna Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [ListGroupsForMember](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/list-groups-for-member.html)di *Referensi AWS CLI Perintah*. 

### `list-groups`
<a name="directory-service-data_ListGroups_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`list-groups`.

**AWS CLI**  
**Untuk mencantumkan grup direktori**  
`list-groups`Contoh berikut mencantumkan grup dalam direktori yang ditentukan.  

```
aws ds-data list-groups \
    --directory-id d-1234567890
```
Output:  

```
{
    "Groups": [
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Administrators",
            "SID": "S-1-2-33-441"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Users",
            "SID": "S-1-2-33-442"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Guests",
            "SID": "S-1-2-33-443"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Print Operators",
            "SID": "S-1-2-33-444"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Backup Operators",
            "SID": "S-1-2-33-445"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Replicator",
            "SID": "S-1-2-33-446"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Remote Desktop Users",
            "SID": "S-1-2-33-447"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Network Configuration Operators",
            "SID": "S-1-2-33-448"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Performance Monitor Users",
            "SID": "S-1-2-33-449"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Performance Log Users",
            "SID": "S-1-2-33-450"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Distributed COM Users",
            "SID": "S-1-2-33-451"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "IIS_IUSRS",
            "SID": "S-1-2-33-452"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Cryptographic Operators",
            "SID": "S-1-2-33-453"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Event Log Readers",
            "SID": "S-1-2-33-454"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Certificate Service DCOM Access",
            "SID": "S-1-2-33-456"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "RDS Remote Access Servers",
            "SID": "S-1-2-33-457"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "RDS Endpoint Servers",
            "SID": "S-1-2-33-458"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "RDS Management Servers",
            "SID": "S-1-2-33-459"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Hyper-V Administrators",
            "SID": "S-1-2-33-460"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Access Control Assistance Operators",
            "SID": "S-1-2-33-461"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Remote Management Users",
            "SID": "S-1-2-33-462"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Storage Replica Administrators",
            "SID": "S-1-2-33-463"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Domain Computers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-789"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Domain Controllers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-790"
        },
        {
            "GroupScope": "Universal",
            "GroupType": "Security",
            "SAMAccountName": "Schema Admins",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-791"
        },
        {
            "GroupScope": "Universal",
            "GroupType": "Security",
            "SAMAccountName": "Enterprise Admins",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-792"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "Cert Publishers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-793"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Domain Admins",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-794"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Domain Users",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-795"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Domain Guests",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-796"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Group Policy Creator Owners",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-797"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "RAS and IAS Servers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-798"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Server Operators",
            "SID": "S-1-2-33-464"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Account Operators",
            "SID": "S-1-2-33-465"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Pre-Windows 2000 Compatible Access",
            "SID": "S-1-2-33-466"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Incoming Forest Trust Builders",
            "SID": "S-1-2-33-467"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Windows Authorization Access Group",
            "SID": "S-1-2-33-468"
        },
        {
            "GroupScope": "BuiltinLocal",
            "GroupType": "Security",
            "SAMAccountName": "Terminal Server License Servers",
            "SID": "S-1-2-33-469"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "Allowed RODC Password Replication Group",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-798"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "Denied RODC Password Replication Group",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-799"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Read-only Domain Controllers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-800"
        },
        {
            "GroupScope": "Universal",
            "GroupType": "Security",
            "SAMAccountName": "Enterprise Read-only Domain Controllers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-801"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Cloneable Domain Controllers",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-802"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Protected Users",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-803"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Key Admins",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-804"
        },
        {
            "GroupScope": "Universal",
            "GroupType": "Security",
            "SAMAccountName": "Enterprise Key Admins",
            "SID": "S-1-2-34-56789123456-7891012345-6789123486-805"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "DnsAdmins",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "DnsUpdateProxy",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "Admins",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWSAdministrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4570"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Object Management Service Accounts",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4571"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Private CA Connector for AD Delegated Group",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4572"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Application and Service Delegated Group",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4573"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4574"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated FSx Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4575"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Account Operators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4576"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Active Directory Based Activation Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4577"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Allowed to Authenticate Objects",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4578"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Allowed to Authenticate to Domain Controllers",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4579"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Deleted Object Lifetime Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4580"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Distributed File System Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4581"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Dynamic Host Configuration Protocol Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4582"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Enterprise Certificate Authority Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4583"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Fine Grained Password Policy Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4584"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Group Policy Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4585"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Managed Service Account Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4586"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Read Foreign Security Principals",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4587"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Remote Access Service Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4588"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Replicate Directory Changes Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4588"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Sites and Services Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4589"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated System Management Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4590"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Terminal Server Licensing Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4591"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated User Principal Name Suffix Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4592"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Add Workstations To Domain Users",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4593"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Domain Name System Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4594"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Kerberos Delegation Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4595"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated Server Administrators",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4596"
        },
        {
            "GroupScope": "DomainLocal",
            "GroupType": "Security",
            "SAMAccountName": "AWS Delegated MS-NPRC Non-Compliant Devices",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4597"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Remote Access",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4598"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Security",
            "SAMAccountName": "Accounting",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4599"
        },
        {
            "GroupScope": "Global",
            "GroupType": "Distribution",
            "SAMAccountName": "sales",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
        }
    ],
    "DirectoryId": "d-1234567890",
    "Realm": "corp.example.com"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui detail grup Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [ListGroups](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/list-groups.html)di *Referensi AWS CLI Perintah*. 

### `list-users`
<a name="directory-service-data_ListUsers_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`list-users`.

**AWS CLI**  
**Untuk mencantumkan pengguna direktori**  
`list-users`Contoh berikut mencantumkan pengguna dalam direktori yang ditentukan.  

```
aws ds-data list-users \
    --directory-id d-1234567890
```
Output:  

```
{
    "Users": [
        {
            "Enabled": true,
            "SAMAccountName": "Administrator",
            "SID": "S-1-2-34-5678910123-4567895012-3456789012-345"
        },
        {
            "Enabled": false,
            "SAMAccountName": "Guest",
            "SID": "S-1-2-34-5678910123-4567895012-3456789012-345"
        },
        {
            "Enabled": false,
            "SAMAccountName": "krbtgt",
            "SID": "S-1-2-34-5678910123-4567895012-3456789012-346"
        },
        {
            "Enabled": true,
            "SAMAccountName": "Admin",
            "SID": "S-1-2-34-5678910123-4567895012-3456789012-347"
        },
        {
            "Enabled": true,
            "SAMAccountName": "Richard Roe",
            "SID": "S-1-2-34-5678910123-4567895012-3456789012-348"
        },
        {
            "Enabled": true,
            "SAMAccountName": "Jane Doe",
            "SID": "S-1-2-34-5678910123-4567895012-3456789012-349"
        },
        {
            "Enabled": true,
            "SAMAccountName": "AWS_WGnzYlN6YyY",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
        },
        {
            "Enabled": true,
            "SAMAccountName": "john.doe",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
        }
    ],
    "DirectoryId": "d-1234567890",
    "Realm": "corp.example.com"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui pengguna Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [ListUsers](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/list-users.html)di *Referensi AWS CLI Perintah*. 

### `remove-group-member`
<a name="directory-service-data_RemoveGroupMember_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`remove-group-member`.

**AWS CLI**  
**Untuk menghapus anggota grup dari direktori**  
`remove-group-member`Contoh berikut menghapus anggota grup tertentu dari grup tertentu dalam direktori tertentu.  

```
aws ds-data remove-group-member \
    --directory-id d-1234567890 \
    --group-name 'sales' \
    --member-name 'john.doe'
```
Perintah ini tidak menghasilkan output.  
Untuk selengkapnya, lihat [Menambahkan dan menghapus anggota Microsoft AD AWS Terkelola ke grup dan grup ke grup](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_add_remove_user_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [RemoveGroupMember](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/remove-group-member.html)di *Referensi AWS CLI Perintah*. 

### `reset-user-password`
<a name="directory-service-data_ResetUserPassword_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`reset-user-password`.

**AWS CLI**  
**Untuk mengatur ulang kata sandi pengguna di direktori**  
`reset-user-password`Contoh berikut me-reset dan memungkinkan pengguna tertentu dalam direktori yang ditentukan.  

```
aws ds reset-user-password \
    --directory-id d-1234567890 \
    --user-name 'john.doe' \
    --new-password 'password'
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Menyetel ulang dan mengaktifkan kata sandi pengguna AWS Microsoft AD Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_reset_user_pswd.html) di Panduan *Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [ResetUserPassword](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/reset-user-password.html)di *Referensi AWS CLI Perintah*. 

### `search-groups`
<a name="directory-service-data_SearchGroups_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`search-groups`.

**AWS CLI**  
**Untuk mencari grup dalam direktori**  
`search-groups`Contoh berikut mencari grup yang ditentukan dalam direktori yang ditentukan.  

```
aws ds-data search-groups \
    --directory-id d-1234567890 \
    --search-attributes 'SamAccountName' \
    --search-string 'sales'
```
Output:  

```
{
    "Groups": [
        {
            "GroupScope": "Global",
            "GroupType": "Distribution",
            "SAMAccountName": "sales",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
        }
    ],
    "DirectoryId": "d-1234567890",
    "Realm": "corp.example.com"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui detail grup Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [SearchGroups](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/search-groups.html)di *Referensi AWS CLI Perintah*. 

### `search-users`
<a name="directory-service-data_SearchUsers_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`search-users`.

**AWS CLI**  
**Untuk mencari pengguna di direktori**  
`search-users`Contoh berikut mencari pengguna yang ditentukan dalam direktori yang ditentukan.  

```
aws ds-data search-users \
    --directory-id d-1234567890 \
    --search-attributes 'SamAccountName' \
    --Search-string 'john.doe'
```
Output:  

```
{
    "Users": [
        {
            "Enabled": true,
            "SAMAccountName": "john.doe",
            "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
        }
    ],
    "DirectoryId": "d-1234567890",
    "Realm": "corp.example.com"
}
```
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui pengguna Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [SearchUsers](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/search-users.html)di *Referensi AWS CLI Perintah*. 

### `update-group`
<a name="directory-service-data_UpdateGroup_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`update-group`.

**AWS CLI**  
**Untuk memperbarui atribut grup dalam direktori**  
`update-group`Contoh berikut memperbarui atribut tertentu untuk grup tertentu dalam direktori tertentu.  

```
aws ds-data update-group \
    --directory-id d-1234567890 \
    --sam-account-name 'sales' \
    --update-type 'REPLACE' \
    --group-type 'Distribution'
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui detail grup Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [UpdateGroup](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/update-group.html)di *Referensi AWS CLI Perintah*. 

### `update-user`
<a name="directory-service-data_UpdateUser_cli_topic"></a>

Contoh kode berikut menunjukkan cara menggunakan`update-user`.

**AWS CLI**  
**Untuk memperbarui atribut pengguna dalam direktori**  
`update-user`Contoh berikut memperbarui atribut tertentu untuk pengguna tertentu dalam direktori tertentu.  

```
aws ds-data update-user \
    --directory-id d-1234567890 \
    --sam-account-name 'john.doe' \
    --update-type 'ADD' \
    --email-address 'example.corp.com'
```
Perintah ini tidak menghasilkan output.  
Untuk informasi selengkapnya, lihat [Melihat dan memperbarui pengguna Microsoft AD AWS Terkelola](https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html) di *Panduan Administrasi Layanan AWS Direktori*.  
+  Untuk detail API, lihat [UpdateUser](https://awscli.amazonaws.com/v2/documentation/api/latest/reference/directory-service-data/update-user.html)di *Referensi AWS CLI Perintah*. 